Next Article in Journal
Contemporary Physical Clone-Resistant Identity for IoTs and Emerging Technologies
Next Article in Special Issue
Generalized Concatenated Codes over Gaussian and Eisenstein Integers for Code-Based Cryptography
Previous Article in Journal
Investigating Deep Learning Approaches on the Security Analysis of Cryptographic Algorithms
Previous Article in Special Issue
A New Class of Q-Ary Codes for the McEliece Cryptosystem
 
 
Article

Article Versions Notes

Cryptography 2021, 5(4), 31; https://doi.org/10.3390/cryptography5040031
Action Date Notes Link
article pdf uploaded. 28 October 2021 18:42 CEST Version of Record https://www.mdpi.com/2410-387X/5/4/31/pdf-vor
article xml file uploaded 1 November 2021 09:08 CET Original file -
article xml uploaded. 1 November 2021 09:08 CET Update https://www.mdpi.com/2410-387X/5/4/31/xml
article pdf uploaded. 1 November 2021 09:08 CET Updated version of record https://www.mdpi.com/2410-387X/5/4/31/pdf
article html file updated 1 November 2021 09:10 CET Original file -
article html file updated 30 July 2022 13:44 CEST Update https://www.mdpi.com/2410-387X/5/4/31/html
Back to TopTop